Excerpt from Cybersecurity News Article, Published on Jan 23, 2025.
The BASHE ransomware group, also known as APT73 or Eraleig, has reportedly claimed responsibility for breaching ICICI Bank’s database, one of India’s largest private sector banks. Allegations surfaced on the dark web, with the BASHE group threatening to leak sensitive customer data unless their ransom demands are met by January 24, 2025. The BASHE ransomware group, active since April 2024, is notorious for targeting high-value industries such as banking, healthcare, and technology. Leveraging sophisticated methods, including Tor-based networks, the group operates a Data Leak Site (DLS) to maintain anonymity and pressure victims through data extortion. Previous attacks include Federal Bank in December 2024, where they claimed to have stolen over 600,000 database entries.
ICICI Bank has yet to confirm or deny the breach. However, social media platforms like X are abuzz with concerns from cybersecurity experts and customers alike. Given ICICI Bank’s classification as “critical information infrastructure” by the Indian government in 2022, the potential impact of a breach is significant. Cybersecurity experts have urged ICICI to take immediate action, including enhancing security measures, notifying affected users, and collaborating with law enforcement agencies to mitigate potential risks. The Indian Computer Emergency Response Team (CERT-In) has not commented yet, but national-level intervention may follow due to the incident’s possible security implications.
ICICI Bank has previously denied allegations of data breaches, stating that leaked data could not be conclusively linked to their systems. As of now, the claims rely on dark web findings and reports from cybersecurity sources, with no official confirmation from the bank. This developing situation highlights the increasing cyber threats to financial institutions and the critical need for robust security measures. As the ransom deadline approaches, all eyes remain on ICICI Bank to address the claims and protect its customers’ data from potential exposure.
To delve deeper into this topic, please read the full article Cybersecurity News.




